Monday, 29 August 2011
Tuesday, 16 August 2011
Saturday, 13 August 2011
Tuesday, 28 June 2011
Collection of Google Dorks Google Hacking Database
So what are Google Dorks ?
They are query words which have special meaning to Google. These words tell Google to do a totally different type of search. These Dorks helps HacKeRs to find the vulnerable pages so they can hack them. This way Google also helps HacKeRs To HacK..
To go to this database Click Here.
Now find Your type of vulnerable pages even if you have no advanced idea of Google Dorks.
Happy dorking.
Now find Your type of vulnerable pages even if you have no advanced idea of Google Dorks.
Happy dorking.
Monday, 27 June 2011
.::XCode Exploit – Vulnurable & webshell Scanner::.
Code name : .::XCode Exploit – Vulnurable & webshell Scanner::.
Description : – SQLI/LFI/XSS/Webshell Hunter with Google Engine -
Compiler : Microsoft Visual Basic 6.0
Author : poni
System : Windows 95, 98, XP, Vista, 7
Size : 718 kb
Update : I`m not sure where will i put it. Just
check the sites below
Description : – SQLI/LFI/XSS/Webshell Hunter with Google Engine -
Compiler : Microsoft Visual Basic 6.0
Author : poni
System : Windows 95, 98, XP, Vista, 7
Size : 718 kb
Update : I`m not sure where will i put it. Just
check the sites below
================================================================
Info :
XCode Exploit – Vulnurable & webshell Scanner help you to
gather the dorks Link from Google. then you may check the
results if its Vulnurable to exploit with SQL injection commands
, LFI,and XSS. And You may hunt the webshells those uploaded.
=================================================================
Info :
XCode Exploit – Vulnurable & webshell Scanner help you to
gather the dorks Link from Google. then you may check the
results if its Vulnurable to exploit with SQL injection commands
, LFI,and XSS. And You may hunt the webshells those uploaded.
=================================================================
Havij v1.15 Advanced SQL Injection
Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.
It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system.
The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij.
The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.
Saturday, 25 June 2011
Wednesday, 25 May 2011
Monday, 23 May 2011
Charles Web Debugging Proxy Application
ABOUT CHARLES
Charles is a web proxy (HTTP Proxy / HTTP Monitor) that runs on your own computer. Your web browser (or any other Internet application) is then configured to access the Internet through Charles, and Charles is then able to record and display for you all of the data that is sent and received.
In Web and Internet development you are unable to see what is being sent and received between your web browser / client and the server. Without this visibility it is difficult and time-consuming to determine exactly where the fault is. Charles makes it easy to see what is happening, so you can quickly diagnose and fix problems.
Charles makes debugging quick, reliable and advanced; saving you time and frustration!
KEY FEATURES
- SSL Proxying – view SSL requests and responses in plain text
- Bandwidth Throttling to simulate slower Internet connections including latency
- AJAX debugging – view XML and JSON requests and responses as a tree or as text
- AMF – view the contents of Flash Remoting / Flex Remoting messages as a tree
- Repeat requests to test back-end changes
- Edit requests to test different inputs
- Breakpoints to intercept and edit requests or responses
- Validate recorded HTML, CSS and RSS/atom responses using the W3C validator
DOWNLOAD CHARLES
Join Us On facebook ĆŁỮβ|ĦΔĆк
All Facebook Shortcut Keys You Need For GOOGLE CHROME
Alt+1 -Return you to Home
Alt+2 -To view the Wall of the profile
Alt+3 -To pull down the Friends Requests list in there
Alt+4 -To retrieve the Messages list of the profile
Alt+5 -To call out the Notification list of the profile
Alt+6 -Go to Account setting page
Alt+7 -Moves page to Account privacy configuration.
Alt+8 -Opens Facebook fans group page
Alt+9 -Skips to Facebook Statement of Rights and Responsibilities
Alt+0 -Go to Facebook Help Center
Alt+m -To Create new message
Alt+? -To move Cursor in the Search Box
Join Us On facebook ĆŁỮβ|ĦΔĆк
Saturday, 21 May 2011
Back|Track 5
BackTrack is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tools collection to-date. Our community of users range from skilled penetration testers in the information security field, government entities, information technology, security enthusiasts, and individuals new to the security community.
Feedback from all industries and skill levels allows us to truly develop a solution that is tailored towards everyone and far exceeds anything ever developed both commercially and freely available. The project is funded by Offensive Security. Whether you’re hacking wireless, exploiting servers, performing a web application assessment, learning, or social-engineering a client, BackTrack is the one-stop-shop for all of your security needs.
Subscribe to:
Posts (Atom)